Debian DSA-2835-1 : asterisk - buffer overflow

This script is Copyright (C) 2014 Tenable Network Security, Inc.


Synopsis :

The remote Debian host is missing a security-related update.

Description :

Jan Juergens discovered a buffer overflow in the parser for SMS
messages in Asterisk.

An additional change was backported, which is fully described in
http://downloads.asterisk.org/pub/security/AST-2013-007.html

With the fix for AST-2013-007, a new configuration option was added in
order to allow the system administrator to disable the expansion
of'dangerous' functions (such as SHELL()) from any interface which is
not the dialplan. In stable and oldstable this option is disabled by
default. To enable it add the following line to the section
'[options]' in /etc/asterisk/asterisk.conf (and restart asterisk)

live_dangerously = no

See also :

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=732355
http://downloads.asterisk.org/pub/security/AST-2013-007.html
http://www.debian.org/security/2014/dsa-2835

Solution :

Upgrade the asterisk packages.

For the oldstable distribution (squeeze), this problem has been fixed
in version 1:1.6.2.9-2+squeeze12.

For the stable distribution (wheezy), this problem has been fixed in
version 1:1.8.13.1~dfsg1-3+deb7u3.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVSS Temporal Score : 4.3
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

Family: Debian Local Security Checks

Nessus Plugin ID: 71848 ()

Bugtraq ID: 64364

CVE ID: CVE-2013-7100